BADCALL is a Trojan malware variant used by the group Lazarus Group. [1]

ID: S0245
Platforms: Windows
Version: 1.0

Techniques Used

Domain ID Name Use
Enterprise T1043 Commonly Used Port BADCALL uses port 8000 and 443 for C2.[1]
Enterprise T1090 Connection Proxy BADCALL functions as a proxy server between the victim and C2 server.[1]
Enterprise T1024 Custom Cryptographic Protocol BADCALL encrypts C2 traffic using an XOR/ADD cipher and uses a FakeTLS method.[1]
Enterprise T1089 Disabling Security Tools BADCALL disables the Windows firewall before binding to a port.[1]
Enterprise T1112 Modify Registry BADCALL modifies the firewall Registry key SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfileGloballyOpenPorts\\List.[1]
Enterprise T1082 System Information Discovery BADCALL collects the computer name and host name on the compromised system.[1]
Enterprise T1016 System Network Configuration Discovery BADCALL collects the network adapter information.[1]


Groups that use this software:

Lazarus Group